• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
HotView Pro™ Mesh Management Software
HotView Pro™ Mesh Management Software

Tarzan: A Peer-to-Peer Anonymizing Network Layer
Tarzan: A Peer-to-Peer Anonymizing Network Layer

Tarzan: A Peer-to-Peer Anonymizing Network
Tarzan: A Peer-to-Peer Anonymizing Network

Probability Model Based Energy Efficient and Reliable
Probability Model Based Energy Efficient and Reliable

ppt
ppt

Large-scale Virtualization in the Emulab Network Testbed
Large-scale Virtualization in the Emulab Network Testbed

... careful allocation and multiplexing of a testbed’s physical resources. To avoid experimental artifacts, the original Emulab used strictly conservative resource allocation. It mapped virtual network nodes and links one-toone onto dedicated PCs and switched Ethernet links. We have four motivations for ...
Development Kit For the PIC® MCU
Development Kit For the PIC® MCU

... • The length can take values from 3 to 133. The Length byte defines the length of just the EZSP frame and is only included if there is information in the EZSP frame. In case of an error in communication, the length byte is replaced by the Error byte that provides more information about the error. • T ...
Massive Distributed and Parallel Log Analysis For Organizational
Massive Distributed and Parallel Log Analysis For Organizational

... the commercial Amazon cloud environments, i.e., Elastic Compute Cloud (EC2) and Simple Storage Service (S3) clouds for computation and storage services, respectively. In our implementation, we develop an analysis application to calculate security event occurrences, and test our framework using it in ...
Emulating an Embedded Firewall Clifford Neuman, Deepak Dayama, and Arun Viswanathan
Emulating an Embedded Firewall Clifford Neuman, Deepak Dayama, and Arun Viswanathan

... emulations, nor do we have data from the NIC card implementations, but we need to look at the expected performance of the emulated EFW under varying circumstances of load and number of policies rules being implemented. Understanding such differences is important because delays in communicating netwo ...
A hybrid MAC protocol for a metro WDM network arrayed-waveguide grating
A hybrid MAC protocol for a metro WDM network arrayed-waveguide grating

P2PIR
P2PIR

Implementation of the Gnutella protocol in Python
Implementation of the Gnutella protocol in Python

OpenShift v3 Scaling, Performance and Capacity Planning
OpenShift v3 Scaling, Performance and Capacity Planning

Scaling Up Clustered Network Appliances with
Scaling Up Clustered Network Appliances with

Document
Document

...  forwarding behavior: using both destination vid (via prefix matching) and a forwarding directive to select gateway & next-hop, with built-in multipath & fast failure (re)routing ...
Path Probing Relay Routing for Achieving High End-to
Path Probing Relay Routing for Achieving High End-to

Trust management in wireless sensor networks
Trust management in wireless sensor networks

... measurements, it calculates their trustworthiness, which is then taken into account when routing decisions are made. In this case, the trust establishment functionality is uniformly distributed all over the network, and so does the implementation cost. The advantage is that there are no ‘single poin ...
"Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks"
"Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks"

LANMAR: Landmark Routing for Large Scale Wireless Ad Hoc
LANMAR: Landmark Routing for Large Scale Wireless Ad Hoc

Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc
Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc

... distance (usually in number of hops) to that destination, and the address of this node’s neighbor router that is the first hop on this shortest route to that destination; the distance to the destination is known as the metric in that table entry. When routing a packet to some destination, the node t ...
Reflections on the Development of A/P Nets
Reflections on the Development of A/P Nets

... • Impractical to count bits up to, say, entry 34578 on the fly! • Solution: Precompute (P2a) – Divide bitmap into chunks (say, 64 bits each) – Store the number of 1 bits in each chunk in an array B – Compute # 1 bits up to bit k by: ...
u1(z)=p1  z00000+p1{2}
u1(z)=p1 z00000+p1{2}

... hostile environment, the ability of a system to tolerate both the impact of external factors (attack) and internal causes (accidental failures or errors) should be considered. The measure of this ability is referred to as system survivability. An external factors usually cause failures of group of s ...
Networking Research Group
Networking Research Group

... Pastry [8] uses a circular 128-bit namespace. It assigns to each overlay node a nodeId chosen randomly with uniform probability from the namespace. Given a message and a destination key, Pastry routes the message to the node whose nodeId is numerically closest to the key. The expected number of hops ...
AS-aware Relay Selection Mechanism for Multiparty Streaming
AS-aware Relay Selection Mechanism for Multiparty Streaming

An Overlay MAC Layer for 802.11 Networks Ananth Rao Ion Stoica UC Berkeley
An Overlay MAC Layer for 802.11 Networks Ananth Rao Ion Stoica UC Berkeley

... case, the channel utilization and hence the total system throughput drops by about 55%. 3.1.2 Sub-optimal Default Allocation In this section, we show two examples where the default bandwidth allocation by the 802.11 MAC is far from ideal. These examples illustrate the need for a flexible allocation ...
< 1 2 3 4 5 6 7 8 ... 42 >

Kademlia

  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report